![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Jinxiao Zhu
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Xufei Li
, Yin Chen
, Jinxiao Zhu
, Shuiguang Zeng, Yulong Shen
, Xiaohong Jiang
, Daqing Zhang
:
Fractal Dimension of DSSS Frame Preamble: Radiometric Feature for Wireless Device Identification. IEEE Trans. Mob. Comput. 23(2): 1416-1430 (2024) - 2023
- [j11]Shuiguang Zeng, Yin Chen, Xufei Li, Jinxiao Zhu
, Yulong Shen, Norio Shiratori:
Time-frequency fusion for enhancement of deep learning-based physical layer identification. Ad Hoc Networks 142: 103099 (2023) - [c8]Shouwan Gao, Jinxiao Zhu, Ziyuan Wang, Siyi Ren, Kuiyuan Zhang, Pengpeng Chen:
FAES-SLAM: Fast and Accurate Edge-Assisted Semantic SLAM Towards Dynamic Environments. GLOBECOM 2023: 3591-3596 - [c7]Siyu Zhu, Yuanyu Zhang, Jinxiao Zhu, Yin Chen, Yulong Shen, Xiaohong Jiang:
3D Convolution-Based Radio Frequency Fingerprinting for Satellite Authentication. GLOBECOM 2023: 7586-7591 - [c6]Yin Chen
, Zhen Jia
, Zeiwei Guo
, Jinxiao Zhu
, Xiaohong Jiang
:
A Review on Feature, Problem Formulation and Application of Radio Frequency Fingerprinting. IoT 2023: 260-264 - 2022
- [j10]Shuiguang Zeng, Yin Chen
, Xufei Li, Jinxiao Zhu
, Yulong Shen, Norio Shiratori:
Visibility graph entropy based radiometric feature for physical layer identification. Ad Hoc Networks 127: 102780 (2022)
2010 – 2019
- 2019
- [j9]Pinchang Zhang
, Jinxiao Zhu, Yin Chen, Xiaohong Jiang:
End-to-End Physical Layer Authentication for Dual-Hop Wireless Networks. IEEE Access 7: 38322-38336 (2019) - 2017
- [j8]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Hideyuki Tokuda:
On the rate of successful transmissions in finite slotted Aloha MANETs. Ad Hoc Networks 62: 76-87 (2017) - 2016
- [j7]Yin Chen
, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang, Hideyuki Tokuda:
On the Throughput Capacity Study for Aloha Mobile Ad Hoc Networks. IEEE Trans. Commun. 64(4): 1646-1659 (2016) - [c5]Jinxiao Zhu, Yin Chen, Masahide Sasaki:
Average secrecy capacity of free-space optical communication systems with on-off keying modulation and threshold detection. ISITA 2016: 616-620 - [i3]Jinxiao Zhu, Yin Chen, Masahide Sasaki:
Average Secrecy Capacity of Free-Space Optical Communication Systems with On-Off Keying Modulation and Threshold Detection. CoRR abs/1601.06377 (2016) - 2015
- [j6]Yuanyu Zhang, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming. Ad Hoc Sens. Wirel. Networks 29(1-4): 113-131 (2015) - [j5]Yin Chen
, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Capacity and delay-throughput tradeoff in ICMNs with Poisson contact process. Wirel. Networks 21(8): 2453-2466 (2015) - [c4]Yin Chen, Jinxiao Zhu, Yulong Shen, Xiaohong Jiang:
Modeling the success transmission rate in Aloha MANETs with Binomial point process. ICMU 2015: 36-41 - [c3]Jinxiao Zhu, Yin Chen, Yoshitaka Nakamura
, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Outage performance of secure multicasting in the presence of multiple eavesdroppers. ICMU 2015: 138-142 - 2014
- [j4]Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy transmission capacity in noisy wireless ad hoc networks. Ad Hoc Networks 21: 123-133 (2014) - [j3]Jinxiao Zhu, Yulong Shen, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Secrecy Capacity and Outage Performance of Correlated Fading Wire-Tap Channel. IEICE Trans. Commun. 97-B(2): 396-407 (2014) - [i2]Jinxiao Zhu, Yin Chen, Yulong Shen, Osamu Takahashi, Xiaohong Jiang, Norio Shiratori:
Secrecy Transmission Capacity in Noisy Wireless Ad Hoc Networks. CoRR abs/1401.6123 (2014) - 2013
- [j2]Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Effects of Channel Correlation on Outage Secrecy Capacity. Inf. Media Technol. 8(4): 1224-1233 (2013) - [j1]Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Effects of Channel Correlation on Outage Secrecy Capacity. J. Inf. Process. 21(4): 640-649 (2013) - [i1]Yin Chen, Yulong Shen, Jinxiao Zhu, Xiaohong Jiang:
Capacity and Delay-Throughput Tradeoff in ICMNs with Poisson Meeting Process. CoRR abs/1310.8374 (2013) - 2012
- [c2]Jinxiao Zhu, Xiaohong Jiang, Osamu Takahashi, Norio Shiratori:
Secrecy capacity of correlated rayleigh fading channels. APCC 2012: 333-337 - [c1]Jinxiao Zhu, Xiaohong Jiang, Yuezhi Zhou, Yaoxue Zhang, Osamu Takahashi, Norio Shiratori:
Outage Performance for Secure Communication over Correlated Fading Channels with Partial CSI. APSCC 2012: 257-262
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint